/external/openssl/ssl/ |
d1_enc.c | 152 else if ( EVP_CIPHER_block_size(ds->cipher) > 1) 154 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0) 184 bs=EVP_CIPHER_block_size(ds->cipher); 211 ds->buf_len, ds->cipher->key_len, 214 ds->cipher->iv_len); 216 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
/external/openssl/crypto/asn1/ |
p5_pbev2.c | 87 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 99 alg_nid = EVP_CIPHER_type(cipher); 116 if (EVP_CIPHER_iv_length(cipher) && 117 RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 123 EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0); 154 EVP_CIPHER_key_length(cipher))) goto merr;
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_openssl.c | 261 const EVP_CIPHER *cipher; local 270 cipher = EVP_rc4(); 277 cipher = EVP_aes_128_cbc(); 280 cipher = EVP_aes_192_cbc(); 283 cipher = EVP_aes_256_cbc(); 293 cipher = EVP_des_ede3_cbc(); 296 cipher = EVP_des_cbc(); 301 cipher = EVP_rc2_ecb(); 311 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) || 313 !EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, key, iv)) [all...] |
aes_wrap.h | 25 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher); 26 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/signers/ |
ISO9796d2Signer.java | 27 private AsymmetricBlockCipher cipher; field in class:ISO9796d2Signer 41 * @param cipher base cipher to use for signature creation/verification 46 AsymmetricBlockCipher cipher, 50 this.cipher = cipher; 83 * @param cipher cipher to use. 87 AsymmetricBlockCipher cipher, 90 this(cipher, digest, false) [all...] |
PSSSigner.java | 26 private AsymmetricBlockCipher cipher; field in class:PSSSigner 40 * @param cipher the assymetric cipher to use. 45 AsymmetricBlockCipher cipher, 49 this(cipher, digest, sLen, TRAILER_IMPLICIT); 53 AsymmetricBlockCipher cipher, 58 this.cipher = cipher; 89 cipher.init(forSigning, kParam); 180 byte[] b = cipher.processBlock(block, 0, block.length) [all...] |
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_encrypt.c | 37 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 54 if ((ctr->padlen == ctr->blocklen) && cipher_descriptor[ctr->cipher].accel_ctr_encrypt != NULL && (len >= (unsigned long)ctr->blocklen)) { 55 if ((err = cipher_descriptor[ctr->cipher].accel_ctr_encrypt(pt, ct, len/ctr->blocklen, ctr->ctr, ctr->mode, &ctr->key)) != CRYPT_OK) { 84 if ((err = cipher_descriptor[ctr->cipher].ecb_encrypt(ctr->ctr, ctr->pad, &ctr->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_encrypt.c | 35 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) { 49 /* xor of IV, MIV and blockcnt == what goes into cipher */ 55 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { 70 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { 82 /* xor of IV, MIV and blockcnt == what goes into cipher */ 88 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) {
|
/external/openssl/crypto/pkcs7/ |
pk7_enc.c | 71 PKCS7_cipher(PKCS7 *p7,EVP_CIPHER *cipher);
|
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
keyDerive.h | 93 ECipherSuite cipher,
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/inc/ |
keyDerive.h | 94 cipherSuite_e cipher,
|
/system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/ |
keyDerive.h | 93 ECipherSuite cipher,
|
/external/openssl/crypto/evp/ |
openbsd_hw.c | 130 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx,int cipher, 138 assert(ctx->cipher->iv_len <= MAX_HW_IV); 142 CDATA(ctx)->cipher=cipher; 170 assert((inl&(ctx->cipher->block_size-1)) == 0); 174 if(ctx->cipher->iv_len) 178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len) [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 82 static int cryptodev_max_iv(int cipher); 83 static int cryptodev_key_length_valid(int cipher, int len); 94 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 216 cryptodev_max_iv(int cipher) 221 if (ciphers[i].id == cipher) 233 cryptodev_key_length_valid(int cipher, int len) 238 if (ciphers[i].id == cipher) 278 sess.cipher = ciphers[i].id; 317 sess.cipher = 0; 393 if ((inl % ctx->cipher->block_size) != 0 439 int cipher; local [all...] |
/dalvik/libcore/crypto/src/main/java/javax/crypto/ |
SealedObject.java | 39 * instance and encrypts it using a cryptographic cipher. 46 * object itself keeps track of the cipher and corresponding parameters. 70 * and sealing it using the specified cipher. 72 * The cipher must be fully initialized. 77 * the cipher to encrypt the object. 81 * if the specified cipher is a block cipher and the length of 85 * if the cipher is {@code null}. 87 public SealedObject(Serializable object, Cipher c) 103 // should be never thrown because the cipher 160 Cipher cipher = Cipher.getInstance(sealAlg); local 256 Cipher cipher = Cipher.getInstance(sealAlg, provider); local [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/ |
JDKDigestSignature.java | 46 private AsymmetricBlockCipher cipher; field in class:JDKDigestSignature 53 AsymmetricBlockCipher cipher) 58 this.cipher = cipher; 74 cipher.init(false, param); 90 cipher.init(true, param); 131 return cipher.processBlock(bytes, 0, bytes.length); 156 sig = cipher.processBlock(sigBytes, 0, sigBytes.length);
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_decrypt_verify_memory.c | 22 @param cipher The index of the cipher desired 37 int eax_decrypt_verify_memory(int cipher, 73 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_decrypt_verify_memory.c | 22 @param cipher The index of the cipher desired 25 @param nonce The session nonce (length of the block size of the block cipher) 34 int ocb_decrypt_verify_memory(int cipher, 58 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|
ocb_encrypt_authenticate_memory.c | 22 @param cipher The index of the cipher desired 33 int ocb_encrypt_authenticate_memory(int cipher, 56 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/hashes/chc/ |
chc.c | 24 static int cipher_idx=UNDEFED_HASH, /* which cipher */ 25 cipher_blocksize; /* blocksize of cipher */ 38 Initialize the CHC state with a given cipher 39 @param cipher The index of the cipher you wish to bind 42 int chc_register(int cipher) 46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 51 kl = cipher_descriptor[cipher].block_length; 59 if ((err = cipher_descriptor[cipher].keysize(&kl)) != CRYPT_OK) { 63 if (kl != cipher_descriptor[cipher].block_length) [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_memory_multi.c | 23 @param cipher The index of the desired cipher 33 int f9_memory_multi(int cipher, 56 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_memory_multi.c | 23 @param cipher The index of the desired cipher 33 int omac_memory_multi(int cipher, 56 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_memory_multi.c | 23 @param cipher The index of the cipher desired 33 int pmac_memory_multi(int cipher, 55 if ((err = pmac_init(pmac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_memory_multi.c | 23 @param cipher The index of the desired cipher 33 int xcbc_memory_multi(int cipher, 56 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) {
|
/external/wpa_supplicant/ |
aes_wrap.h | 25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher); 26 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
|